AMERSFOORT, 19 OCTOBER 2021 – QS solutions today announced their worldwide and exclusivedistributorship forCloudLabSmart Calculator to add value in security assessments that are delivered with the Cyber Security Assessment Tool (CSAT).Throughthis distributorship the two players in assessment software tooling also join development forces to integrate security assessments with TCO and ROI calculations.
AMSTERDAM, 28 SEPTEMBER 2021 – Capital A has acquired a stake in QS solutions, a company working with a worldwide partner network of distributors including ALSO, Ingram Micro and Tech Data to sell their proprietary software products: the Cyber Security Assessment Tool (CSAT) and PortalTalk – a Security & Governance add-on for Microsoft Teams. QS solutions also delivers implementation consultancy services for Microsoft Cloud products including Microsoft 365, Azure and Dynamics 365.
Cyber Security means firewalls and penetration tests to most people. The general opinion is that getting these technical aspects sorted out
means a tick in the box for Cyber Security, right? Of course, firewalls and penetration tests are important, but this doesn’t mean that Cyber Security can be taken off the agenda. User activity within the IT infrastructure by administrators, end-users and external partners and customers cannot be ignored. This is where one of the major security risks resides: the end-user taking security risks without even realising that they are doing so.
We worry more and more about our privacy, both in our private and working lives. It’s more important than ever that our data is stored safely and processed with our privacy in mind.
The number of Facebook users who left the social network following a recent breach demonstrates this clearly. In order to prevent this type of infringement, the European Union decided to issue a regulation designed to protect the personal details of European citizens: the GDPR (General Data Protection Regulation) which is in force as of 25th of May 2018. The message being sent by the new regulation is clear: “treat personal data with care’.
Developing an action plan to improve the security of the IT infrastructure is not simple. Where should you get started? What are the priorities? What vulnerabilities are there? IT infrastructure is complex and there are many aspects to be taken into consideration. Your gut-feeling is that improvements can be made but getting hard facts to back that feeling up is time-consuming. There must be a better way!
Cookies
Yes. We also use cookies. We do this to make our website function properly, to improve the quality and make it more relevant. We also use cookies for marketing purposes. Do you want to know how we handle your data? Read our privacy statement which also has a link to the cookie statement with additional information about how we use cookies.
Necessary cookies are always enabled as they are required to browse the website. You can also enable marketing cookies for an optimal experience of our website.